搜索结果: 1-5 共查到“军事学 Constraint”相关记录5条 . 查询时间(0.015 秒)
Security is an Architectural Design Constraint
Digital systems design constraints security-efficiency trade-off
2019/3/1
In state-of-the-art design paradigm, time, space and power efficiency are considered the primary design constraints. Quite often, this approach adversely impacts the security of the overall system, es...
Analysis of AES, SKINNY, and Others with Constraint Programming
Differential Cryptanalysis Integral Cryptanalysis Constraint Programming
2017/2/24
Search for different types of distinguishers are common tasks in symmetric-key cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems. First, we show ...
Revisiting AES Related-Key Differential Attacks with Constraint Programming
AES Constraint Programming Related Key differential
2017/2/21
The Advanced Encryption Standard (AES) is one of the most studied symmetric encryption schemes. During the last years, several attacks have been discovered in different adversary models. In this paper...
Constraint-hiding Constrained PRFs for NC1 from LWE
Graded encodings constraint-hiding PRFs functional encryption
2017/2/21
Constraint-hiding constrained PRFs (CHCPRFs), initially studied by Boneh, Lewi and Wu [PKC 2017], are constrained PRFs where the constrained key hides the description of the constraint. Envisioned wit...
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Boomerang Differential Trails SAT-Based Constraint Solver URSA
2016/1/8
In order to obtain differential patterns over many rounds of a cryptographic primitive,
the cryptanalyst often needs to work on local differential trail analysis. Examples include
merging two differ...